ADVISORIES

CERT-GH advisories & alerts inform current reported cybersecurity vulnerabilities and threats identified. The advisories provide a summary of the threat analysed. Descriptions of threats reported as well as procedures to mitigate the threats and minimise their impact are provided as part of advisories

Guidance on Defending Against Video Teleconferencing (VTC) Hijacking and Zoom-bombing

The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) hijacking (referred to as “Zoom-bombing” when attacks are to the Zoom VTC platform).

Read More

Smartphone or Tablet Hacked

If you use public Wi-Fi or USB power charging stations at airports, hotels, and other locations, make sure to use a VPN when using public Wi-Fi, and always make sure to use a USB data blocker...

Read More

Mobile Money Fraud

Mobile money agents and telecom workers are not to ask you for your PIN to initiate any transaction on your behalf. Your PIN is your secret number.

Read More

Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers.

Read More

Romance Scam

Romance scammers are smooth operators and can take their time to set their trap. Scammers take advantage of people looking for romantic partners...

Read More

Website Defacement

CWebsite defacement is an attack on a website that changes the visual appearance of the site or webpage. It is similar to drawing graffiti on a wall, only it happens virtually as a kind of electronic graffiti and is a form of vandalism.

Read More

Sextortion

This is a form of blackmail in which sexual information or images are used to extort sexual favors or cash from the victim. Social media and text messages are often the source of the sexual material and the threatened means of sharing it with others.

Read More

WhatsApp Scam #1

Whatsapp Gold!! This is nothing but a trick used by scammers to install malware and viruses onto our phone or device. It’s an old trick, claiming that there is a secret update to WhatsApp that gave users enhanced features that could be shared around.

Read More

Advisory On RDP Brute Force Attacks

A way for employees to access corporate devices is by using Remote Desktop Protocol (RDP). Remote Desktop is a remote management tool which allows you to connect to any computer and take over the desktop.

Read More

Alert Regarding Vulnerability (CVE-2019-19781) in Citrix Products

CERT-GH confirmed that information including Proof-of-Concept code about a vulnerability (CVE-2019-19781) in Citrix Application Delivery Controller and Citrix Gateway has been made public. A remote attacker leveraging this vulnerability may execute arbitrary code.

Read More